× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 07fd2b650e31c25abeb0e5cc366e3bcd88f652a7e78f28e4c1bfb448e5c6e129
File name: Minion3.0.5.exe
Detection ratio: 0 / 49
Analysis date: 2019-03-17 18:01:45 UTC ( 1 day, 3 hours ago )
Antivirus Result Update
Acronis 20190313
Ad-Aware 20190317
AegisLab 20190317
AhnLab-V3 20190317
Alibaba 20190306
ALYac 20190317
Antiy-AVL 20190317
Arcabit 20190317
Avast 20190317
Avast-Mobile 20190317
AVG 20190317
Avira (no cloud) 20190317
Babable 20180918
Baidu 20190306
BitDefender 20190317
Bkav 20190314
CAT-QuickHeal 20190317
ClamAV 20190317
CMC 20190317
Comodo 20190317
CrowdStrike Falcon (ML) 20190212
Cybereason 20190109
Cylance 20190317
Cyren 20190317
DrWeb 20190317
Emsisoft 20190317
Endgame 20190215
ESET-NOD32 20190317
F-Prot 20190317
F-Secure 20190317
Fortinet 20190317
GData 20190317
Ikarus 20190317
Sophos ML 20190313
Jiangmin 20190317
K7AntiVirus 20190317
K7GW 20190315
Kaspersky 20190317
Kingsoft 20190317
Malwarebytes 20190317
MAX 20190317
McAfee 20190317
McAfee-GW-Edition 20190317
Microsoft 20190317
eScan 20190317
NANO-Antivirus 20190317
Palo Alto Networks (Known Signatures) 20190317
Panda 20190317
Qihoo-360 20190317
Rising 20190317
SentinelOne (Static ML) 20190317
Sophos AV 20190317
SUPERAntiSpyware 20190314
Symantec 20190316
Symantec Mobile Insight 20190220
TACHYON 20190317
Tencent 20190317
TheHacker 20190315
TotalDefense 20190317
Trapmine 20190301
TrendMicro 20190317
TrendMicro-HouseCall 20190317
Trustlook 20190317
VBA32 20190315
ViRobot 20190317
Webroot 20190317
Yandex 20190315
Zillya 20190315
ZoneAlarm by Check Point 20190317
Zoner 20190317
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright

Product Minion
File version
Description Minion Setup
Comments This installation was built with Inno Setup.
Signature verification Certificate out of its validity period
Signers
[+] Good Game Mods LLC
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer COMODO RSA Code Signing CA
Valid from 12:00 AM 04/20/2016
Valid to 11:59 PM 04/20/2017
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint CF1F42B0ED71FF4E457EC9F588E095C6326C128D
Serial number 3A C2 A9 C8 6C 12 23 26 BF 1A 4E 73 1C 7A AE CE
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 12:00 AM 05/09/2013
Valid to 11:59 PM 05/08/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE™
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 12:00 AM 01/19/2010
Valid to 11:59 PM 01/18/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Packers identified
F-PROT INNO, appended, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-08-19 11:39:13
Entry Point 0x000113BC
Number of sections 8
PE sections
Overlays
MD5 54c54f8d9a46b28a702e233e0cae4217
File type data
Offset 434176
Size 52391128
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetExitCodeProcess
CreateProcessW
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetVersion
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
SysReAllocStringLen
SysFreeString
SysAllocStringLen
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 5
RT_RCDATA 3
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 8
PE resources
ExifTool file metadata
SubsystemVersion
5.0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Minion Setup

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

InitializedDataSize
368128

EntryPoint
0x113bc

MIMEType
application/octet-stream

TimeStamp
2014:08:19 12:39:13+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
3.0

UninitializedDataSize
0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Good Game Mods LLC

CodeSize
65024

ProductName
Minion

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3db05bed9b1e86a0d797312f4e64d830
SHA1 4b9d737aab03420392e8866181778edb38594df3
SHA256 07fd2b650e31c25abeb0e5cc366e3bcd88f652a7e78f28e4c1bfb448e5c6e129
ssdeep
786432:J5oXarlmWaSeN/itDBDqbYvUkfBpss9IcsYPq+ruVffZIDABoJqn/isMqV9vL9:J5kaxmWcSB0YvUOEwrixfZWhJqRLVpZ

authentihash b90871bb9106993afee205861addbf68cabfaf8b5938674bfab0eb226b44fff5
imphash 48aa5c8931746a9655524f67b25a47ef
File size 50.4 MB ( 52825304 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (35.7%)
Win16/32 Executable Delphi generic (16.4%)
OS/2 Executable (generic) (16.0%)
Generic Win/DOS Executable (15.8%)
DOS Executable Generic (15.8%)
Tags
peexe overlay signed via-tor

VirusTotal metadata
First submission 2016-09-08 20:01:59 UTC ( 2 years, 6 months ago )
Last submission 2019-03-17 18:01:45 UTC ( 1 day, 3 hours ago )
File names Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5(1).exe
Minion3.0.5.exe
Minion3.0.5.exe
ESO_Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
Minion3.0.5.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!